Skip to main content
  • Home
  • About Us
  • Jobs
  • HackQuesters Community

Search form

Home
  • Read
    • Security Articles
    • Best Practices
    • Security News
    • Snippets
    • Threat Advisory
  • Security Assessments
  • Contribute
  • Login
Home Himanshu Porwal

Himanshu Porwal

Primary tabs

  • View(active tab)
  • Track

Follow Us

Featured Articles

Common Pitfalls in Security Testing & Proactive Measures for Mitigation
Thursday, February 7, 2019 - 12:30
Relying on antivirus? Bypassing antivirus is easier than you think
Thursday, February 7, 2019 - 11:20
8 pointer guide to secure data and applications on cloud
Tuesday, January 29, 2019 - 12:55
Internet of Things – Security measures to be considered
Monday, January 21, 2019 - 15:24
Introduction to Cloud Control Matrix (CCM)
Thursday, January 17, 2019 - 12:58

Keywords

Compliance IoT Data Protection Privacy BYOD Cyber Attack Risk Assessment Vulnerability Digital Forensics Internet of Things Data Security malware Hacking Security Application Security Cloud Security Data breach Vulnerability Management Cyber Security Information Security
More

Documents and Reports

Introduction to Cloud Control Matrix (CCM)
Thursday, January 17, 2019 - 12:58
PDF icon Introduction to Cloud Control Matrix-converted.pdf
Malware Advisory - Alert: APT 10 Targeting UK Organizations
Wednesday, January 2, 2019 - 12:57
PDF icon Malware Advisory- APT10 expanding.pdf
Malware Advisory - OTP-based 2FA Breach
Monday, December 17, 2018 - 08:24
PDF icon 2FA Authentication Breach.pdf
Weekly Security Bulletin
Monday, December 17, 2018 - 08:10
PDF icon Weekly Security Bulletin - 14th December 2018 .pdf
Malware Advisory - Shamoon Malware
Thursday, December 13, 2018 - 08:41
PDF icon Malware Advisory - Shamoon Malware.pdf
 
Cyber Security Community

"A meeting point"

The community for security subject matter experts to view & express, industry leading cyber security experiences and best practices . The community covers cyber security global trends, happenings, articles, best practices and snippets across security domains targeted towards CIO, CISO, CTO, Directors, mid level security professionals & executives.

 

Last Viewed

Defense against Zero day attacks
Monday, February 1, 2016 - 18:38
IoT ÔÇô Handle with care
Monday, September 14, 2015 - 15:33
Devil's Ivy Vulnerability Could Afflict Millions of Devices!
Saturday, November 4, 2017 - 14:49
Password managers and why you should use it?
Saturday, November 4, 2017 - 15:51
Chevening - TCS Cyber Security Fellowship
Monday, August 10, 2015 - 14:55

Best Practices

ISO Organisation's IT GRC automation evaluation criteria
Thursday, December 6, 2018 - 16:28
Manual Access Re-certification to Avoid Risk of Data Breach
Thursday, March 9, 2017 - 20:14
Security Information and Event Management (SIEM) Solution -Best Practices
Thursday, March 9, 2017 - 16:45
Cybersecurity v1.1 draft (NIST)
Friday, January 13, 2017 - 23:09
Draft SP 800-181 NICE Cybersecurity Workforce Framework (NCWF) by NIST
Monday, November 7, 2016 - 07:44

© Tata Consultancy Services Limited 2015. All rights Reserved.

  • Home
  • Terms and Conditions
  • About Us
  • Security Forum
  • Contact Us